General

  • Target

    d6e0d0e29d7bc64a938a5b6a504de9ca_JaffaCakes118

  • Size

    47KB

  • Sample

    241208-nw9h6axmar

  • MD5

    d6e0d0e29d7bc64a938a5b6a504de9ca

  • SHA1

    3c7e06e0ac513e6b81f0e0190c24ab87ed38481b

  • SHA256

    fba104d3876538a45e0f3ecb3f5b560b8eb06014efb780c15f62a7578466b70f

  • SHA512

    85011022b1951a018c406542fb37d29010612374fd53b403e7f86f38b02d0aec443e7e0af4d6d3feae4711cc9cd0fa9efd4275b628bec7ec2d7b78dbe27a4c9f

  • SSDEEP

    768:R5scsxI71Hv2mTEb4YXVzancAloPCx+k2uIuHtod6gWtxVjkeaPnAJWAEnRmtln:R5sc375Ab4EBanICQFuIiyd6gWHpkea4

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      d6e0d0e29d7bc64a938a5b6a504de9ca_JaffaCakes118

    • Size

      47KB

    • MD5

      d6e0d0e29d7bc64a938a5b6a504de9ca

    • SHA1

      3c7e06e0ac513e6b81f0e0190c24ab87ed38481b

    • SHA256

      fba104d3876538a45e0f3ecb3f5b560b8eb06014efb780c15f62a7578466b70f

    • SHA512

      85011022b1951a018c406542fb37d29010612374fd53b403e7f86f38b02d0aec443e7e0af4d6d3feae4711cc9cd0fa9efd4275b628bec7ec2d7b78dbe27a4c9f

    • SSDEEP

      768:R5scsxI71Hv2mTEb4YXVzancAloPCx+k2uIuHtod6gWtxVjkeaPnAJWAEnRmtln:R5sc375Ab4EBanICQFuIiyd6gWHpkea4

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Modifies firewall policy service

    • Modifies security service

    • Network Share Discovery

      Attempt to gather information on host network.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks